Cyber attacks and security breaches : coping with external threats.
(eVideo)
Contributors
Published
[San Francisco, California, USA] : Kanopy Streaming, 2014.
Physical Desc
1 online resource (1 video file, approximately 26 min.) : digital, .flv file, sound
Status
Description
Loading Description...
Also in this Series
Checking series information...
More Details
Format
eVideo
Language
English
Notes
General Note
Title from title frames.
Date/Time and Place of Event
Originally produced by SmartPros in 2012.
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics for Access Data, offers expert advice and best practices that will help IT professionals keep their networks safe and secure. Track: Technical briefings. In-depth information on new technologies, techniques and solution providers. Learning objectives: Understand the nature of external network security threats today. Explain the techniques and methodologies being utilized by attackers. Understand how to reduce the risk of an external cyber-attack. Identify best practices that will help organizations keep their networks safe and secure.
System Details
Mode of access: World Wide Web.
Citations
APA Citation, 7th Edition (style guide)
(2014). Cyber attacks and security breaches: coping with external threats . Kanopy Streaming.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)2014. Cyber Attacks and Security Breaches: Coping With External Threats. Kanopy Streaming.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Cyber Attacks and Security Breaches: Coping With External Threats Kanopy Streaming, 2014.
MLA Citation, 9th Edition (style guide)Cyber Attacks and Security Breaches: Coping With External Threats Kanopy Streaming, 2014.
Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.
Staff View
Grouped Work ID
724f2f04-690b-cb58-18fa-661faf1dfe1d-eng
Grouping Information
Grouped Work ID | 724f2f04-690b-cb58-18fa-661faf1dfe1d-eng |
---|---|
Full title | cyber attacks and security breaches coping with external threats |
Author | kanopy |
Grouping Category | movie |
Last Update | 2022-07-12 21:16:40PM |
Last Indexed | 2024-03-28 03:55:09AM |
Book Cover Information
Image Source | sideload |
---|---|
First Loaded | Dec 21, 2020 |
Last Used | Jan 23, 2024 |
Marc Record
First Detected | Feb 04, 2014 12:00:00 AM |
---|---|
Last File Modification Time | Aug 01, 2021 04:45:15 AM |
MARC Record
LEADER | 02364ngm a22003851i 4500 | ||
---|---|---|---|
001 | kan1089883 | ||
003 | CaSfKAN | ||
005 | 20140204133419.0 | ||
006 | m o c | ||
007 | vz uzazuu | ||
007 | cr una---unuuu | ||
008 | 140807p20142012cau025 o vleng d | ||
028 | 5 | 2 | |a 1089883|b Kanopy |
035 | |a (OCoLC)897770048 | ||
040 | |a UtOrBLW|b eng|e rda|c UtOrBLW | ||
245 | 0 | 0 | |a Cyber attacks and security breaches :|b coping with external threats. |
264 | 1 | |a [San Francisco, California, USA] :|b Kanopy Streaming,|c 2014. | |
300 | |a 1 online resource (1 video file, approximately 26 min.) :|b digital, .flv file, sound | ||
336 | |a two-dimensional moving image|2 rdacontent | ||
337 | |a computer|2 rdamedia | ||
338 | |a online resource|2 rdacarrier | ||
344 | |a digital | ||
347 | |a video file|b MPEG-4|b Flash | ||
500 | |a Title from title frames. | ||
518 | |a Originally produced by SmartPros in 2012. | ||
520 | |a On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics for Access Data, offers expert advice and best practices that will help IT professionals keep their networks safe and secure. Track: Technical briefings. In-depth information on new technologies, techniques and solution providers. Learning objectives: Understand the nature of external network security threats today. Explain the techniques and methodologies being utilized by attackers. Understand how to reduce the risk of an external cyber-attack. Identify best practices that will help organizations keep their networks safe and secure. | ||
538 | |a Mode of access: World Wide Web. | ||
650 | 0 | |a Business enterprises|x Computer networks|x Security measures. | |
650 | 0 | |a Computer science. | |
650 | 0 | |a Economics. | |
650 | 0 | |a Cyberterrorism. | |
650 | 0 | |a Computer crimes. | |
710 | 2 | |a Kanopy (Firm) | |
856 | 4 | 0 | |u https://pueblolibrary.kanopy.com/node/89884|z A Kanopy streaming video |
856 | 4 | 2 | |z Cover Image|u https://www.kanopy.com/node/89884/external-image |